ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model A. Ahmad and D. Al-Abri Department of Electrical and Computer Engineering College of Engineering, Sultan Qaboos University P. O. Box 33, Postal Code 123; Muscat, Sultanate of Oman Tel.: (968) 2414 1327; Fax. (968) 2441 3416 E-mails
[email protected];
[email protected]
Abstract—This paper presents a developed tool for PseudoRandom Binary Code generator (PRBCG). Based on extensive study of LFSR theory we developed the simulation model of PRBCG. The developed model is faster and simulates the process for very high length of Linear Feedback Shift Registers (LFSRs). We tested our model for the value n = 300 where n is the length of the LFSR. The developed software model is also capable of providing the transition states of different bits of LFSRs. Further, the model has capability of switching to any possible characteristic polynomial (feedback connections) of n-bit LFSR. Also, the model is designed such that it can accommodate all the possible initial conditions (2n) of LFSR.
Optimized Counters In this paper we present a developed simulated tool which is capable of generating PRBC efficiently. The developed tool is culmination of exhaustive study of LFSR theory. Therefore, in the ensuing section first we briefly present the mathematical modeling of LFSR. II. MATHEMATICAL MODEL OF LINEAR FEEDBACK SHIFT REGISTER There exist many LFSR models. The classifications of LFSR models are based on the placements of the ExclusiveOR circuits and the shifts of the registers. The classifications on basis of shifts are right to left or left to right. Also, the shift is considered from the first bit to last bit or from last bit to the first bit. Similarly, the classifications of LFSRs on the basis of Exclusive-OR circuits are recognized as External Exclusive-OR (EEOR) or as Internal Exclusive-OR (IEOR). Figure 1 depicts an n-bit LFSR circuit. This structure is based on External Exclusive-OR circuits. The shift register shifts the data from bit n to bit 1 while the feedback taps vector [c0, c1, . . . cn]. The feedback taps c1, c2, . . cn are linked with flipflop’s outputs Qn, Qn-1, . . Q2, Q1 respectively whereas c0 link represents the connection between the output of EEOR circuits and the input of the flip-flop n. The state space model of this LFSR can be described as follows.
Index Terms— Pseudo-Random Binary Code, Linear Feedback Shift Registers, Generating Function, Feedback Connection, Initial Condition, m-sequence
I. INTRODUCTION Pseudo-Random Binary Code (PRBC) is widely used in modern engineering. The generation of PRBCs and study of their properties has attained the more and more attention of the researchers because of its wide applications. Therefore, how to design the Linear Feedback Shift Register (LFSR) based hardware circuit to generate PRBCs. Moreover, the PRBC sequence o the longest cycle is popularly known as Maximal Length PRBC sequence (m-sequence). The msequence which is one of the basic sequences has always been topic of current research. Linear Feedback Shift Registers (LFSRs) have been used for Pseudo-Random Binary Code Sequence (PRBCS) generation. The PRRBSs have been used for multiple uses in digital systems design. Applications include cryptographic applications like stream ciphers and data hiding. The concept of LFSR theory is useful in many error correction and detection codes. The PRRBSs have been used in Built-In Self-Testing (BIST) for VLSI circuits [1] – [19]. Many more application of LFSR and PRBCS can be listed as given below: Wireless Communications Data Integrity Checksums Data Compression Pseudo-random Number Generation (PN) Direct Sequence Spread Spectrum Scrambler/Descrambler © 2012 ACEEE DOI: 01.IJIT.02.01. 53
Figure 1. An n-bit LFSR
The state space model of this LFSR structure can be described as given in equation (1). To explain let matrix [A] represent the state transition matrix of order n × n, for an n stage LFSR shown in Fig. 1. Let the state at any time ‘t’ be represented by vector [Q(t)] = [ Qn(t), ... ,Qj(t), ... ,Q2(t), Q1(t)] (which is effectively the contents of the LFSR) where each Qj represents the state of the jth stage of the LFSR. Further, let the LFSR feedback stages be numbered from C0 to Cn, proceeding in the same direction as the shifting occurs i.e. 33
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 a very small memory space and execution time is also less. During the test and execution of this developed model we never faced the problem of hanging of computer. Also, the output file can be exported either in EXCEL, MATLAB, C and FORTRAN 95.
[9] Jamil, T. and Ahmad, A., “An investigation in to the application of linear feedback shift registers for steganography,” Proceedings IEEE SoutheastCon2002, Columbia, SC, USA, April 5 – 7, 2002, pp. 239 – 244, 2002 [10] Ahmad A., Al-Musharafi, M. J., Al-Busaidi, S., “Design and study of a strong stream crypto-system model for e-commerce,” International Council for Computer Communication Publishers, Washington DC, USA (The ACM Library), vol. 1, pp. 619 – 630, 2002 [11] Ahmad, A., Development of State Model Theory for External Exclusive NOR Type LFSR Structures, Enformatika, vol. 10, pp. 125 – 129, 2005 [12] Ball, J.R., Spittle, A.H., Liu, H.T., ”High-speed m sequence generation: a further note,” Electronics Letters, vol. 11, no. 5, pp. 107 – 108, 11 July 2007 [13] Ahmad, A., “Investigation of Typical Properties of Some LFSR Structures,” Journal of System Science and Engineering, vol. 17, no. 1, pp. 65 – 69, 2008 [14] Ahmad, A., and Al-Maashri, A., “Investigating Some Special Sequence Length Generated Through an External Exclusive-NOR Type LFSRs,” International Journal Electrical and Computer Engineering, (PERGAMON, Elsevier Science), vol. 34, pp. 270 – 280, 2008 [15] Ahmad, A., Al-Mashari, A. and Al-Lawati, A. J., “On Locking Conditions in M-Sequence Generators for the Use in Digital Watermarking”, Proceedings International Conference on Methods and Models in Computer Science (ICM2CS09), pp. 111 – 115, 2009 [16] Fangfang Cheng, Jingyu Hua, Jiaxiang Zhu, Lei Tong and Liming Meng, “A Fast Generation Method of Bent Sequences and Its Application in ADS Simulation,” Proceedings Wase international conference on information engineering (ICIE-2010), pp. 328 – 331, 2010 [17] Junying Sun and Jiaxing Chen, “Design of m sequence generator based on protues,” Proceedings international conference on computer, mechatronics, control and electronic engineering (CMCE), pp. 126 – 128, 2010 [18] Ahmad, A., “A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Test Pattern Generator and MultiInput Shift Register (MISR)”, International journal of VLSI design & Communication Systems (VLSICS), vol.1, No.4, 2010 [19] A. Ahmad and L. Hayat, “Selection of polynomials for cyclic redundancy check for the use of high speed embedded systems – An algorithmic procedure”, WSEAS Transactions on Computers, vol. 10, no. 1, pp. 16 – 20, 2011
ACKNOWLEDGMENT The authors wish to thank and acknowledge the support grant (SQU-DVC/ PSR/RAID/2010/23) provided by Sultan Qaboos University, Sultanate of Oman. REFERENCES [1] Golomb, S.W., “Shift Register Sequences. Aegean Park Press,” Leguna Hills - U.S.A., 1982 [2] Ahmad A., Nanda N.K. and Garg K., “A critical role of primitive polynomials in an LFSR based testing technique,” IEE Electronics Letters (UK), vol.24, no.15, 1988, pp. 953 – 955, 1988 [3] Ahmad, A., Nanda, N. K. and Garg, K., “The use of irreducible characteristic polynomials in an LFSR based testing of digital circuits,” Proceedings of 4th IEEE international conference of region 10 (TENCON-89), pp. 494 – 496 1989 [4] Ahmad A., Nanda N.K. and Garg K., “Are primitive polynomials always best in signature analysis?” IEEE design & Test of Computers (USA), 1990, vol.7, no.4, pp. 36 – 38, 1990 [5] Ahmad, A., Nanda, N. K., and Garg, K., “An efficient design of maximal length of pseudorandom test pattern generators,” Proceedings of IEEE international conference on signals & systems, held at Ail-Ain (UAE), Jan. 29 - 31, vol.1, pp. 27 – 34, 1990 [6] Ahmad A. and Elabdalla A. M., “An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences,” Computer & Electrical Engineering - An Int’l Journal (USA), vol. 23, no. 1, pp. 33-39, 1997 [7] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., “A new algorithmic procedure to test m-sequences generating feedback connections of stream cipher’s LFSRs,” Proceedings IEEE conference on electrical and electronic technology (TENCON’01), vo. 1, pp. 366 – 369, 2001 [8] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., Al-Naamany, A. M., and Jervase, A. J., “An NLFSR based sequence generator for stream ciphers,” Proceedings (SETA’01) - An International Conference on Sequences & Their Applications, pp. 11 – 13, 2001
© 2012 ACEEE DOI: 01.IJIT.02.01. 53
36